HackDig : Dig high-quality web security articles for hacker

When you are performing penetration tests for your customers, you need to build your personal arsenal. Tools, pieces of hardware and software are collected here and there depending on your engagements to increase your toolbox. To perform Wireless intrusion tests, I’m a big fan of the WiFi Pineapple. I’ve one for years (model MK5). It’s not

2017 is finally here. You know what that means: another information security conference season is upon us. We couldn’t be more excited!Just like we did last year, we at The State of Security have assembled a list of the top 13 conferences in information security for 2017. We hope you’ll have the chance to attend at least one of these events this

Recently it came to my attention that it was possible to abuse JSONP callbacks using a vulnerability known as SOME – Same Origin Method Execution which can be used by an attacker to widely abuse a user’s trust between the web application and the intended flow of execution. For example, using the SOME attack it is possible for an attacker to trick

Personally, I have been a user of IRC since 2004 on some private networks and some other well-known ones such as Freenode. However, it was always inconvenient to have to set up an IRC Bouncer, so when IRCCloud came around, I was excited to try it and see if it provided me with a method of staying connected to all the required networks without having to downl

So as you do, I was just looking around, manually fuzzing some Web Sockets requests, seeing if I could get any sort of XSS, Remote IRC Command Injection or SQLi mainly – ended up that I didn’t find much there that worse worth noting. So I started seeing if their logic was all alright, so one of their requests looked similar to:
{“_reqid”:1234, “cid”:5678, “t

maybe this was a solved problem but I couldn't find a solution online.Problem #1:Metasploit RHOSTS takes the file parameter so you can pass in a list of ip ranges. It will also take hostnames as long as they resolve. If you have giant list of stuff and one of them doesn't resolve then the RHOSTS wont load and you'll want to cry.Problem #2:Lots of proxy

If you work in an enterprise defense role, chances are your day is comprised of coffee, email, meetings, crises, coffee, interruptions, coffee, and meetings (and, most likely, alcohol). The meetings seem useless and the interruptions unceasing. Your stress piles up while your family time dwindles, and you find yourself wondering at the end of the day (or dur

Fabric is a python library to automate tasksAs the README says:Fabric is a Python (2.5-2.7) library and command-line tool for streamlining the use of SSH for application deployment or systems administration tasks. More specifically, Fabric is:A tool that lets you execute arbitrary Python functions via the command line;A library of subroutines (built on

Want:To run a command against multiple SSH servers and you want to use metasploit to do itHow:There doesn't exist a multi_ssh_exec type aux module to run commands. Luckily ? the ssh_login module creates a command shell session for you, on successful logins. You can use the builtin sessions functionality to run a command against all your (SSH) sessions.msf au

Exposed git resources is probably the most gruesome low2pwned issues out there right now.Leaving this exposed allows an attacker to potentially download the full source of the site along with any other files that are in the git repository.Ron's blog post on skullsecurity (see Resources) was my first exposure to the subject. I actually blogged about it back i

I wanted to automate connecting to MSGRPC. I did find a few older tutorials on the subject:http://blog.spiderlabs.com/2012/01/scripting-metasploit-using-msgrpc-.htmlhttp://jumpespjump.blogspot.com/2013/05/metasploit-msgrpc-with-python-on-kali.htmlhttps://www.fishnetsecurity.com/6labs/blog/scripting-metasploit-pythonhttps://khr0x40sh.wordpress.com/2012/05/htt

I had an interesting discussion with a friend this morning. He explained that, when he is conducting a pentest, he does not hesitate to add sometimes in his report a specific finding regarding the lack of attention given to the previous reports. If some companies are motivated by good intentions and ask for regular pentests against their infrastructure or a